BR0011870A - Method and arrangement for generating encryption keys, and, system - Google Patents
Method and arrangement for generating encryption keys, and, systemInfo
- Publication number
- BR0011870A BR0011870A BR0011870-2A BR0011870A BR0011870A BR 0011870 A BR0011870 A BR 0011870A BR 0011870 A BR0011870 A BR 0011870A BR 0011870 A BR0011870 A BR 0011870A
- Authority
- BR
- Brazil
- Prior art keywords
- authentication process
- encryption
- cof
- encryption keys
- entity authentication
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3273—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/065—Continuous authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Abstract
"MéTODO E ARRANJO PARA GERAR CHAVES DE CIFRAGEM, E, SISTEMA". Métodos e arranjos são providos para uso em sistemas de comunicações que permitem sessões de comunicações seguras via um enlace de comunicação entre. Pelo menos, dispositivos nós (12', 16'). Um processo de autenticação de entidade é conduzido usando uma chave de criptografia (70). Durante o processo de autenticação, um valor desvio de cifragem (COF) (50) é gerado. Cada nó (12', 16') armazena o valor de COF (50) e usa o valor de COF (50) para gerar subseq³entes chaves de cifragem (70) que são empregadas para criptografar dados transmitidos entre os nós (12', 16'). Desse modo há uma relação lógica entre o último processo de autenticação de entidade e chaves de cifragem geradas subseq³entemente (70). Isto aumenta a segurança e pode ser usado para reduzir o sobrecusto de processamento/retardos associados com a repetição de processo de autenticação de enlace ou entidade. Os métodos e arranjos podem ser empregados para realçar a segurança em qualquer sistema de comunicações., incluindo um sistema de telecomunicações móvel como, por exemplo, um sistema global para sistema de comunicações móvel. (GSM)."METHOD AND ARRANGEMENT TO GENERATE KEYS OF ENCRYPTION, AND, SYSTEM". Methods and arrangements are provided for use in communications systems that allow secure communications sessions via a communication link between. At least, node devices (12 ', 16'). An entity authentication process is conducted using an encryption key (70). During the authentication process, an encryption deviation (COF) value (50) is generated. Each node (12 ', 16') stores the COF value (50) and uses the COF value (50) to generate subsequent encryption keys (70) that are used to encrypt data transmitted between the nodes (12 ', 16 '). In this way, there is a logical relationship between the last entity authentication process and the subsequently generated encryption keys (70). This increases security and can be used to reduce the processing overhead / delays associated with the repetition of the link or entity authentication process. Methods and arrangements can be employed to enhance security in any communications system, including a mobile telecommunications system, such as a global system for mobile communications systems. (GSM).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/344,387 US6633979B1 (en) | 1999-06-25 | 1999-06-25 | Methods and arrangements for secure linking of entity authentication and ciphering key generation |
PCT/EP2000/005742 WO2001001630A1 (en) | 1999-06-25 | 2000-06-21 | Methods and arrangements for secure linking of entity authentication and ciphering key generation |
Publications (1)
Publication Number | Publication Date |
---|---|
BR0011870A true BR0011870A (en) | 2002-03-05 |
Family
ID=23350345
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR0011870-2A BR0011870A (en) | 1999-06-25 | 2000-06-21 | Method and arrangement for generating encryption keys, and, system |
Country Status (8)
Country | Link |
---|---|
US (1) | US6633979B1 (en) |
EP (1) | EP1190526A1 (en) |
JP (2) | JP2003503896A (en) |
CN (1) | CN1371565A (en) |
AU (1) | AU5817600A (en) |
BR (1) | BR0011870A (en) |
MY (1) | MY130611A (en) |
WO (1) | WO2001001630A1 (en) |
Families Citing this family (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6633550B1 (en) | 1997-02-20 | 2003-10-14 | Telefonaktiebolaget Lm Ericsson (Publ) | Radio transceiver on a chip |
US6569824B2 (en) | 2000-02-16 | 2003-05-27 | Novartis Ag | Contact lens treating method and composition |
US8121296B2 (en) | 2001-03-28 | 2012-02-21 | Qualcomm Incorporated | Method and apparatus for security in a data processing system |
US7693508B2 (en) * | 2001-03-28 | 2010-04-06 | Qualcomm Incorporated | Method and apparatus for broadcast signaling in a wireless communication system |
US9100457B2 (en) | 2001-03-28 | 2015-08-04 | Qualcomm Incorporated | Method and apparatus for transmission framing in a wireless communication system |
US8077679B2 (en) | 2001-03-28 | 2011-12-13 | Qualcomm Incorporated | Method and apparatus for providing protocol options in a wireless communication system |
WO2002091662A1 (en) * | 2001-05-01 | 2002-11-14 | Vasco Data Security, Inc. | Use and generation of a session key in a secure socket layer connection |
US7500104B2 (en) * | 2001-06-15 | 2009-03-03 | Microsoft Corporation | Networked device branding for secure interaction in trust webs on open networks |
US7680085B2 (en) * | 2001-07-24 | 2010-03-16 | Symbol Technologies, Inc. | Out-of-band management and traffic monitoring for wireless access points |
US7082200B2 (en) * | 2001-09-06 | 2006-07-25 | Microsoft Corporation | Establishing secure peer networking in trust webs on open networks using shared secret device key |
US7352868B2 (en) * | 2001-10-09 | 2008-04-01 | Philip Hawkes | Method and apparatus for security in a data processing system |
US7649829B2 (en) | 2001-10-12 | 2010-01-19 | Qualcomm Incorporated | Method and system for reduction of decoding complexity in a communication system |
US7149556B2 (en) * | 2002-06-07 | 2006-12-12 | Hewlett-Packard Development Company, L.P. | Method and apparatus for optimized battery life and authentication in contactless technology |
US7599655B2 (en) | 2003-01-02 | 2009-10-06 | Qualcomm Incorporated | Method and apparatus for broadcast services in a communication system |
US20040168081A1 (en) * | 2003-02-20 | 2004-08-26 | Microsoft Corporation | Apparatus and method simplifying an encrypted network |
US7644275B2 (en) | 2003-04-15 | 2010-01-05 | Microsoft Corporation | Pass-thru for client authentication |
US8098818B2 (en) | 2003-07-07 | 2012-01-17 | Qualcomm Incorporated | Secure registration for a multicast-broadcast-multimedia system (MBMS) |
US8718279B2 (en) * | 2003-07-08 | 2014-05-06 | Qualcomm Incorporated | Apparatus and method for a secure broadcast system |
TWI386004B (en) * | 2003-07-08 | 2013-02-11 | Qualcomm Inc | Apparatus and method for a secure broadcast system |
US8724803B2 (en) | 2003-09-02 | 2014-05-13 | Qualcomm Incorporated | Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system |
FR2862397A1 (en) * | 2003-11-13 | 2005-05-20 | St Microelectronics Sa | Electronic apparatus booting method, involves extending secure domain to application processor, when application and boot-strap processors are authenticated, and booting operating system of processors to store data in protected part of RAM |
CN100571132C (en) * | 2004-03-22 | 2009-12-16 | 国际商业机器公司 | Many cipher key content treatment system and method |
US7616189B2 (en) * | 2005-01-12 | 2009-11-10 | Pacer Technology Co., Ltd. | Optical mouse light emitter |
US8621577B2 (en) * | 2005-08-19 | 2013-12-31 | Samsung Electronics Co., Ltd. | Method for performing multiple pre-shared key based authentication at once and system for executing the method |
SG169991A1 (en) * | 2006-02-28 | 2011-04-29 | Certicom Corp | System and method for product registration |
EP2016701A4 (en) * | 2006-04-25 | 2012-04-25 | Stephen Laurence Boren | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks |
US20170012949A1 (en) * | 2006-04-25 | 2017-01-12 | Stephen Laurence Boren | Dynamic identity verification and authentication continuous, dynamic one-time-pad/one-time passwords and dynamic distributed key infrastructure for secure communications with a single key for any key-based network security controls |
US20130227286A1 (en) * | 2006-04-25 | 2013-08-29 | Andre Jacques Brisson | Dynamic Identity Verification and Authentication, Dynamic Distributed Key Infrastructures, Dynamic Distributed Key Systems and Method for Identity Management, Authentication Servers, Data Security and Preventing Man-in-the-Middle Attacks, Side Channel Attacks, Botnet Attacks, and Credit Card and Financial Transaction Fraud, Mitigating Biometric False Positives and False Negatives, and Controlling Life of Accessible Data in the Cloud |
DE102006039327B4 (en) * | 2006-08-22 | 2008-06-26 | Nokia Siemens Networks Gmbh & Co.Kg | Procedure for authentication |
CN105450400B (en) | 2014-06-03 | 2019-12-13 | 阿里巴巴集团控股有限公司 | Identity verification method, client, server and system |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4403078A (en) | 1982-09-07 | 1983-09-06 | Texaco Inc. | Epoxy resin composition |
US5091942A (en) * | 1990-07-23 | 1992-02-25 | Ericsson Ge Mobile Communications Holding, Inc. | Authentication system for digital cellular communications |
JP2555220B2 (en) * | 1990-12-17 | 1996-11-20 | 日本電信電話株式会社 | Authentication method in digital mobile communication |
US5179591A (en) * | 1991-10-16 | 1993-01-12 | Motorola, Inc. | Method for algorithm independent cryptographic key management |
JPH05347617A (en) * | 1992-06-15 | 1993-12-27 | Toshiba Corp | Communication method for radio communication system |
US5351293A (en) | 1993-02-01 | 1994-09-27 | Wave Systems Corp. | System method and apparatus for authenticating an encrypted signal |
US5371794A (en) * | 1993-11-02 | 1994-12-06 | Sun Microsystems, Inc. | Method and apparatus for privacy and authentication in wireless networks |
US5594795A (en) | 1994-07-05 | 1997-01-14 | Ericsson Inc. | Method and apparatus for key transforms to discriminate between different networks |
US5991407A (en) * | 1995-10-17 | 1999-11-23 | Nokia Telecommunications Oy | Subscriber authentication in a mobile communications system |
US5748734A (en) * | 1996-04-02 | 1998-05-05 | Lucent Technologies Inc. | Circuit and method for generating cryptographic keys |
JP4216914B2 (en) * | 1997-10-17 | 2009-01-28 | 株式会社リコー | Network system |
US6230002B1 (en) | 1997-11-19 | 2001-05-08 | Telefonaktiebolaget L M Ericsson (Publ) | Method, and associated apparatus, for selectively permitting access by a mobile terminal to a packet data network |
-
1999
- 1999-06-25 US US09/344,387 patent/US6633979B1/en not_active Expired - Lifetime
-
2000
- 2000-05-16 MY MYPI20002138A patent/MY130611A/en unknown
- 2000-06-21 EP EP00943854A patent/EP1190526A1/en not_active Withdrawn
- 2000-06-21 AU AU58176/00A patent/AU5817600A/en not_active Abandoned
- 2000-06-21 JP JP2001506186A patent/JP2003503896A/en active Pending
- 2000-06-21 BR BR0011870-2A patent/BR0011870A/en not_active Application Discontinuation
- 2000-06-21 CN CN00812025A patent/CN1371565A/en active Pending
- 2000-06-21 WO PCT/EP2000/005742 patent/WO2001001630A1/en not_active Application Discontinuation
-
2012
- 2012-01-11 JP JP2012003596A patent/JP2012110009A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
JP2012110009A (en) | 2012-06-07 |
WO2001001630A1 (en) | 2001-01-04 |
US6633979B1 (en) | 2003-10-14 |
CN1371565A (en) | 2002-09-25 |
EP1190526A1 (en) | 2002-03-27 |
MY130611A (en) | 2007-07-31 |
JP2003503896A (en) | 2003-01-28 |
AU5817600A (en) | 2001-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR0011870A (en) | Method and arrangement for generating encryption keys, and, system | |
BR9917545A (en) | Process for establishing a key using air communication and password protocol and password protocol | |
BRPI0417840A (en) | system, method, and devices for authentication to a wireless local area network (wlan) | |
BR0100191A (en) | Method and apparatus for performing a key update using an update key | |
BR9902942A (en) | Method for updating the secret shared data in a wireless communication system. | |
BR9902940A (en) | Method for transferring sensitive information that initially uses unsecured communications. | |
BRPI0517261A (en) | system and method for providing a multicredential authentication protocol | |
BRPI0519861A2 (en) | methods for authenticating a client, and for operating authentication server within a communications system, authentication server, method for operating a client coupled to a communication network, client terminal, and method for authenticating user equipment | |
NO20044793L (en) | Some update in a cellular network system | |
ATE417470T1 (en) | BOOTSTRAPPING AUTHENTICATION USING DISTINGUISHED RANDOM QUERIES | |
FI20001837A (en) | authentication.pm: | |
WO2004051964A3 (en) | Tunneled authentication protocol for preventing man-in-the-middle attacks | |
BR9907826A (en) | Communication system for secure wireless communications, process for establishing a secure communication link between a first dual-mode device and a second dual-mode device for a communication system, and a transmit-receive device for secure wireless communication in a communication system | |
ATE348457T1 (en) | SECURE COMMUNICATION | |
BR0109815A (en) | Authentication of data transmitted in a digital transmission system | |
BR0206632A (en) | Method to enable pki functions on a smart card | |
BR9307360A (en) | Method and apparatus for authenticating client and server communication | |
ES2154647T3 (en) | METHOD AND SYSTEM OF SPECIFICATION OF INDEPENDENT INTERFACE OF THE IMPLEMENTATION. | |
BRPI0407702A (en) | Method for creating and distributing cryptographic keys on a mobile radio system and mobile radio system | |
BRPI0411834A (en) | method for generating and managing a local area network | |
BR0309881A (en) | secure wireless data communications device and method for transmitting plain text in an encrypted message | |
DE3775924D1 (en) | SECRET KEY MANAGEMENT. | |
BRPI0413462A (en) | method and device for securing content distribution over a communication network through content keys | |
BRPI0415916A (en) | method and equipment for providing application credentials | |
ATE332599T1 (en) | METHOD AND DEVICE FOR INITIALIZING SECURE CONNECTIONS BETWEEN AND ONLY BETWEEN ASSOCIATED CORDLESS DEVICES |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FA10 | Dismissal: dismissal - article 33 of industrial property law | ||
B11Y | Definitive dismissal - extension of time limit for request of examination expired [chapter 11.1.1 patent gazette] |